Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
c0d8b90c by Moritz Muehlenhoff at 2024-02-28T09:44:23+01:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -2,33 +2,33 @@ CVE-2024-27913 (ospf_te_parse_te in ospfd/ospf_te.c in 
FRRouting (FRR) through 9
        - frr <unfixed>
        NOTE: https://github.com/FRRouting/frr/pull/15431
 CVE-2024-26542 (Cross Site Scripting vulnerability in Bonitasoft, S.A v.7.14. 
and fixe ...)
-       TODO: check
+       NOT-FOR-US: Bonitasoft
 CVE-2024-26302 (A vulnerability in the web-based management interface of 
ClearPass Pol ...)
-       TODO: check
+       NOT-FOR-US: HPE
 CVE-2024-26301 (A vulnerability in the web-based management interface of 
ClearPass Pol ...)
-       TODO: check
+       NOT-FOR-US: HPE
 CVE-2024-26300 (A vulnerability in the guest interface of ClearPass Policy 
Manager cou ...)
-       TODO: check
+       NOT-FOR-US: HPE
 CVE-2024-26299 (A vulnerability in the web-based management interface of 
ClearPass Pol ...)
-       TODO: check
+       NOT-FOR-US: HPE
 CVE-2024-26298 (Vulnerabilities in the ClearPass Policy Manager web-based 
management i ...)
-       TODO: check
+       NOT-FOR-US: HPE
 CVE-2024-26297 (Vulnerabilities in the ClearPass Policy Manager web-based 
management i ...)
-       TODO: check
+       NOT-FOR-US: HPE
 CVE-2024-26296 (Vulnerabilities in the ClearPass Policy Manager web-based 
management i ...)
-       TODO: check
+       NOT-FOR-US: HPE
 CVE-2024-26295 (Vulnerabilities in the ClearPass Policy Manager web-based 
management i ...)
-       TODO: check
+       NOT-FOR-US: HPE
 CVE-2024-26294 (Vulnerabilities in the ClearPass Policy Manager web-based 
management i ...)
-       TODO: check
+       NOT-FOR-US: HPE
 CVE-2024-24027 (SQL Injection vulnerability in Likeshop before 2.5.7 allows 
attackers  ...)
-       TODO: check
+       NOT-FOR-US: Likeshop
 CVE-2024-22723 (Webtrees 2.1.18 is vulnerable to Directory Traversal. By 
manipulating  ...)
-       TODO: check
+       NOT-FOR-US: Webtrees
 CVE-2024-1943 (The Yuki theme for WordPress is vulnerable to Cross-Site 
Request Forge ...)
-       TODO: check
+       NOT-FOR-US: WordPress theme
 CVE-2024-1932 (Unrestricted Upload of File with Dangerous Type in 
freescout-helpdesk/ ...)
-       TODO: check
+       NOT-FOR-US: freescout-helpdesk
 CVE-2024-1892 (Parts of the Scrapy API were found to be vulnerable to a ReDoS 
attack. ...)
        TODO: check
 CVE-2024-1866
@@ -38,23 +38,23 @@ CVE-2024-1865
 CVE-2024-1864
        REJECTED
 CVE-2024-1568 (The Seraphinite Accelerator plugin for WordPress is vulnerable 
to Serv ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-1388 (The Yuki theme for WordPress is vulnerable to unauthorized 
modificatio ...)
-       TODO: check
+       NOT-FOR-US: WordPress theme
 CVE-2024-0763 (Any user can delete an arbitrary folder (recursively) on a 
remote serv ...)
-       TODO: check
+       NOT-FOR-US: anythingllm
 CVE-2024-0550 (A user who is privileged already `manager` or `admin` can set 
their pr ...)
-       TODO: check
+       NOT-FOR-US: anythingllm
 CVE-2023-50737 (The SE menu contains information used by Lexmark to diagnose 
device er ...)
-       TODO: check
+       NOT-FOR-US: Lexmark
 CVE-2023-50736 (A memory corruption vulnerability has been identified in 
PostScript in ...)
-       TODO: check
+       NOT-FOR-US: Lexmark
 CVE-2023-50735 (A heap corruption vulnerability has been identified in 
PostScript inte ...)
-       TODO: check
+       NOT-FOR-US: Lexmark
 CVE-2023-50734 (A buffer overflow vulnerability has been identified in 
PostScript inte ...)
-       TODO: check
+       NOT-FOR-US: Lexmark
 CVE-2023-50303 (IBM InfoSphere Information Server 11.7 is vulnerable to 
cross-site scr ...)
-       TODO: check
+       NOT-FOR-US: IBM
 CVE-2021-46969 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
        - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/0ecc1c70dcd32c0f081b173a1a5d89952686f271 (5.13-rc1)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c0d8b90cf1a882c215930ed4409951d2f418d2bd

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c0d8b90cf1a882c215930ed4409951d2f418d2bd
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to